The most often used approaches to obtaining and using residuals in applied work with time series models, are unified and documented with both partially-known and new features. Spe...
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
The analysis of gene expression time series obtained from microarray experiments can be effectively exploited to understand a wide range of biological phenomena from the homeostat...
Hierarchical genome assembly can be divided into three distinct stages: sequencing and assembling shotgun reads for each of a series of selected BAC clones; assembling the resulti...
Daolong Wang, Mario Lauria, Bo Yuan, Fred A. Wrigh...
Content-based image retrievalsystems use low-levelfeatures like color and texturefor image representation. Given these representationsasfeature vectors, similarity between images ...
Selim Aksoy, Robert M. Haralick, Faouzi Alaya Chei...